OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
Ammar Ahmed Khan, Muhammad Mubashir Khan, Kashif Mehboob Khan, et al.
Computer Networks (2021) Vol. 196, pp. 108217-108217
Open Access | Times Cited: 66

Showing 26-50 of 66 citing articles:

Combining Multiple Classifiers using Ensemble Method for Anomaly Detection in Blockchain Networks: A Comprehensive Review
Sabri Hisham, Mokhairi Makhtar, Azwa Abdul Aziz
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 8
Open Access | Times Cited: 18

A Systematic Literature Review of Blockchain Technology for Internet of Drones Security
Yasmine Harbi, Khedidja Medani, Chirihane Gherbi, et al.
Arabian Journal for Science and Engineering (2022) Vol. 48, Iss. 2, pp. 1053-1074
Open Access | Times Cited: 18

Blockchain-Assisted Machine Learning with Hybrid Metaheuristics-Empowered Cyber Attack Detection and Classification Model
Ashwag Albakri, Bayan Alabdullah, Fatimah Alhayan
Sustainability (2023) Vol. 15, Iss. 18, pp. 13887-13887
Open Access | Times Cited: 9

A Review of Collaborative Trajectory Planning for Multiple Unmanned Aerial Vehicles
Li Wang, Weicheng Huang, Haoxin Li, et al.
Processes (2024) Vol. 12, Iss. 6, pp. 1272-1272
Open Access | Times Cited: 3

A blockchain-assisted security management framework for collaborative intrusion detection in smart cities
Wenjuan Li, Christian T Stidsen, Tobias Adam
Computers & Electrical Engineering (2023) Vol. 111, pp. 108884-108884
Closed Access | Times Cited: 7

Real-Time Collaborative Intrusion Detection System in UAV Networks Using Deep Learning
Hassan Jalil Hadi, Yue Cao, Sifan Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33371-33391
Closed Access | Times Cited: 2

Crystal Structure Optimization with Deep-Autoencoder-Based Intrusion Detection for Secure Internet of Drones Environment
Khalid Alissa, Saud S. Alotaibi, Fatma S. Alrayes, et al.
Drones (2022) Vol. 6, Iss. 10, pp. 297-297
Open Access | Times Cited: 11

IPSHO-Fed: a hybrid federated learning and spotted hyena optimization approach for trust assessment
R. Manjula Devi
Neural Computing and Applications (2024) Vol. 36, Iss. 10, pp. 5571-5594
Closed Access | Times Cited: 1

WildSaver: Advancing Wildlife Conservation with UAVs and Blockchain Technology
Afifa Islam Ananna, Mahedul Hasan Rifat, Shanjida Akter, et al.
Lecture notes in networks and systems (2024), pp. 475-483
Closed Access | Times Cited: 1

Review on IOMT Security through Distributed Machine Learning
Swasthika Bhaskar, M. Vanitha
(2024), pp. 1-5
Closed Access | Times Cited: 1

A Hierarchical Unmanned Aerial Vehicle Network Intrusion Detection and Response Approach Based on Immune Vaccine Distribution
Jiangchuan Chen, Junjiang He, Wenshan Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33312-33325
Closed Access | Times Cited: 1

U-SMART: unified swarm management and resource tracking framework for unoccupied aerial vehicles
Abhishek Phadke, F. Antonio Medrano, Michael J. Starek
Drone Systems and Applications (2024) Vol. 12, pp. 1-26
Closed Access | Times Cited: 1

An intelligent intrusion prediction and prevention system for software defined internet of things cloud networks
S. Kranthi, M. Kanchana, Suneetha Manne
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 210-225
Closed Access | Times Cited: 6

Security Challenges for UAV Systems Communications: Potential Attacks and Countermeasures
Wojdan BinSaeedan, Atheer Aldawsari, Laila Alhussain, et al.
Springer eBooks (2023), pp. 269-288
Closed Access | Times Cited: 3

An Intelligent Network Intrusion Detection Framework for Reliable UAV-Based Communication
Sujit Bebortta, Sumanta Kumar Singh
Algorithms for intelligent systems (2023), pp. 169-177
Closed Access | Times Cited: 3

SecFedIDM-V1: A Secure Federated Intrusion Detection Model With Blockchain and Deep Bidirectional Long Short-Term Memory Network
Emmanuel Baldwin Mbaya, Emmanuel Adetiba, Joke A. Badejo, et al.
IEEE Access (2023) Vol. 11, pp. 116011-116025
Open Access | Times Cited: 3

A comprehensive review of significant learning for anomalous transaction detection using a machine learning method in a decentralized blockchain network
Sabri Hisham, Mokhairi Makhtar, Azwa Abdul Aziz
International Journal of Advanced Technology and Engineering Exploration (2022) Vol. 9, Iss. 95
Open Access | Times Cited: 5

A Systematic Mapping Study in Intrusion Detection System for Unmanned Aerial Vehicles Security
Leandro Marcos da Silva, Isadora Garcia Ferrão, Kalinka R. L. J. C. Branco
(2022), pp. 43-48
Closed Access | Times Cited: 5

Modelling of Metaheuristics with Machine Learning-Enabled Cybersecurity in Unmanned Aerial Vehicles
Mohammed Aljebreen, Hanan Abdullah Mengash, Mohammad Alamgeer, et al.
Sustainability (2022) Vol. 14, Iss. 24, pp. 16741-16741
Open Access | Times Cited: 4

Empirical Investigation on Blockchain Interoperability
Kashif Mehboob Khan, Aabira Fahim, Darakhshan M Saleem, et al.
VFAST Transactions on Software Engineering (2023) Vol. 11, Iss. 1, pp. 25-36
Open Access | Times Cited: 2

Blockchain Assisted Intrusion Detection System Using Differential Flower Pollination Model
Mohammed Altaf Ahmed, Sara A. Althubiti, D. N. Rao, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 3, pp. 4695-4711
Open Access | Times Cited: 3

Machine learning algorithms for blockchain-based security mechanisms in UAVs: a review
Eser Gemikonaklı, Yoney Kirsal Ever
Elsevier eBooks (2024), pp. 187-197
Closed Access

Improved Adaptive Spiral Seagull Optimizer for Intrusion Detection and Mitigation in Wireless Sensor Network
Swathi Darla, C. Naveena
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access

Scalable and Cost-Efficient PoA Consensus-Based Blockchain Solution for Vaccination Record Management
Neetu Sharma, Rajesh Rohilla
Wireless Personal Communications (2024) Vol. 135, Iss. 2, pp. 1177-1207
Closed Access

Scroll to top